| Tweetovi |
| starPt proslijedio/la je tweet | ||
|
Dave dwizzzle Weston
@dwizzzleMSFT
|
5. velj |
|
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from @BlueHatIL 2019: github.com/dwizzzle/Prese…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Min(Spark) Zheng
@SparkZheng
|
5. velj |
|
finally, it comes! XNU ( kernel of iOS 13 and macOS 10.15) source code: opensource.apple.com/tarballs/xnu/x… new mitigation and new bypass. :-) pic.twitter.com/3aDRVGmFnx
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Frank Denis
@jedisct1
|
4. velj |
|
Awesome LD_PRELOAD
github.com/gaul/awesome-l…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Doyensec
@Doyensec
|
3. velj |
|
Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE blog.doyensec.com/2020/02/03/hea… #infosec pic.twitter.com/z5ZUEETMnp
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Pavel Yosifovich
@zodiacon
|
2. velj |
|
Chapter 6 has been published!
leanpub.com/windows10syste…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Aleksei
@hellman1908
|
2. velj |
|
I am starting a blog. First post is about the StarkWare Hash Challenge affine.group/2020/02/starkw…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
InfoSect
@infosectcbr
|
2. velj |
|
Pointer Compression in V8 and what it means for browser exploitation by @farazsth98 blog.infosectcbr.com.au/2020/02/pointe…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
|
Axel Souchet
@0vercl0k
|
31. sij |
|
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
starlabs
@starlabs_sg
|
31. sij |
|
Some of the bugs in VirtualBox found by @4nhdaden
There are more to come.
CVE-2019-2984 - starlabs.sg/advisories/19-…
CVE-2019-3002 - starlabs.sg/advisories/19-…
CVE-2019-3005 - starlabs.sg/advisories/19-…
CVE-2019-3026 - starlabs.sg/advisories/19-…
CVE-2019-3031 - starlabs.sg/advisories/19-…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
SandboxEscaper
@SandboxBear
|
31. sij |
|
sandboxescaper.blogspot.com/2020/01/chasin… Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
j00ru//vx
@j00ru
|
30. sij |
|
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! googleprojectzero.blogspot.com/2020/01/part-i…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Ronen Shustin
@ronenshh
|
30. sij |
|
|
||
| starPt proslijedio/la je tweet | ||
|
kmkz
@kmkz_security
|
29. sij |
|
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
James Forshaw
@tiraniddo
|
30. sij |
|
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). tiraniddo.dev/2020/01/dont-u…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Walied Assar
@waleedassar
|
27. sij |
|
Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption
waleedassar.blogspot.com/2020/01/malfor…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Cyber Advising
@cyber_advising
|
26. sij |
|
How a double-free bug in WhatsApp turns to RCE
awakened1712.github.io/hacking/hackin… pic.twitter.com/4xlPrtx0XF
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Root-Me
@rootme_org
|
27. sij |
|
Interested in learning Windows Kernel exploitation ?
@Synacktiv wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.
root-me.org/en/breve/New-s… pic.twitter.com/q8oSwfd5cC
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Swissky
@pentest_swissky
|
26. sij |
|
Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳
github.com/sagishahar/lpe…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Binni Shah
@binitamshah
|
24. sij |
|
Hypervisor From Scratch – Part 7 : Using EPT & Page-Level Monitoring Features : rayanfam.com/topics/hypervi…
6: Virtualizing An Already Running System : rayanfam.com/topics/hypervi…
5: Setting up VMCS & Running Guest Code : rayanfam.com/topics/hypervi… cc @Intel80x86
github.com/SinaKarvandi/H…
|
||
|
|
||
| starPt proslijedio/la je tweet | ||
|
Ptrace Security GmbH
@ptracesecurity
|
23. sij |
|
Red Team Diary, Entry #3: Custom Malware Development (Establishing A Shell Through the Target’s Browser) blog.usejournal.com/red-team-diary… #Malware #RedTeam #CyberSecurity #Hacking #Infosec pic.twitter.com/IrhaNRQofD
|
||
|
|
||